All the vulnerabilites related to Keiyo System Co., LTD - TimeWorks
jvndb-2025-000036
Vulnerability from jvndb
Published
2025-06-03 15:35
Modified
2025-06-03 15:35
Severity ?
Summary
TimeWorks vulnerable to path traversal
Details
The web server module of TimeWorks provided by Keiyo System Co., LTD contains the following vulnerability.
<ul><li>Path traversal (CWE-22) - CVE-2025-41428</li></ul>
Masamu Asato of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
References
▼ | Type | URL |
---|---|---|
JVN | https://jvn.jp/en/jp/JVN37075430/index.html | |
CVE | https://www.cve.org/CVERecord?id=CVE-2025-41428 | |
Path Traversal(CWE-22) | https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html |
Impacted products
▼ | Vendor | Product |
---|---|---|
Keiyo System Co., LTD | TimeWorks |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2025/JVNDB-2025-000036.html", "dc:date": "2025-06-03T15:35+09:00", "dcterms:issued": "2025-06-03T15:35+09:00", "dcterms:modified": "2025-06-03T15:35+09:00", "description": "The web server module of TimeWorks provided by Keiyo System Co., LTD contains the following vulnerability.\r\n\r\n\u003cul\u003e\u003cli\u003ePath traversal (CWE-22) - CVE-2025-41428\u003c/li\u003e\u003c/ul\u003e\r\n\r\nMasamu Asato of GMO Cybersecurity by Ierae, Inc. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.", "link": "https://jvndb.jvn.jp/en/contents/2025/JVNDB-2025-000036.html", "sec:cpe": { "#text": "cpe:/a:misc:keiyo_system_timeworks", "@product": "TimeWorks", "@vendor": "Keiyo System Co., LTD", "@version": "2.2" }, "sec:cvss": { "@score": "5.3", "@severity": "Medium", "@type": "Base", "@vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "@version": "3.0" }, "sec:identifier": "JVNDB-2025-000036", "sec:references": [ { "#text": "https://jvn.jp/en/jp/JVN37075430/index.html", "@id": "JVN#37075430", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-41428", "@id": "CVE-2025-41428", "@source": "CVE" }, { "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html", "@id": "CWE-22", "@title": "Path Traversal(CWE-22)" } ], "title": "TimeWorks vulnerable to path traversal" }
cve-2025-41428
Vulnerability from cvelistv5
Published
2025-06-03 08:09
Modified
2025-06-03 13:31
Severity ?
5.3 (Medium) - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
6.9 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
6.9 (Medium) - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS score ?
Summary
Improper limitation of a pathname to a restricted directory ('Path Traversal') issue exists in TimeWorks 10.0 to 10.3. If exploited, arbitrary JSON files on the server may be viewed by a remote unauthenticated attacker.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Keiyo System Co., LTD | TimeWorks |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-41428", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-06-03T13:31:39.186168Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-03T13:31:54.645Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "TimeWorks", "vendor": "Keiyo System Co., LTD", "versions": [ { "status": "affected", "version": "10.0 to 10.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper limitation of a pathname to a restricted directory (\u0027Path Traversal\u0027) issue exists in TimeWorks 10.0 to 10.3. If exploited, arbitrary JSON files on the server may be viewed by a remote unauthenticated attacker." } ], "metrics": [ { "cvssV3_0": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.0" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] }, { "cvssV4_0": { "baseScore": 6.9, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "version": "4.0" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "Improper limitation of a pathname to a restricted directory (\u0027Path Traversal\u0027)", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-03T08:09:40.730Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://www.keiyo-system.co.jp/archives/11310" }, { "url": "https://jvn.jp/en/jp/JVN37075430/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2025-41428", "datePublished": "2025-06-03T08:09:40.730Z", "dateReserved": "2025-05-28T02:51:58.417Z", "dateUpdated": "2025-06-03T13:31:54.645Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }